PDA

View Full Version : Tony Parker's House



davi78239
02-17-2005, 01:44 PM
Anybody seen the infamous tour on spurs.com yet?

TMTTRIO
02-17-2005, 01:54 PM
yeah that was cool. He has a really nice house. I hope they show Tim and Manu's house now. I guess they won't do Manu's house since he's a "Time Warner Customer, are you?" guy :lol.

DuncanMVP
02-17-2005, 02:08 PM
I saw the video, parker is really proud of his wireless labtop :elephant

Useruser666
02-17-2005, 02:09 PM
I was once at David Robinson's house.

blackbucket
02-17-2005, 02:18 PM
I saw the video, parker is really proud of his wireless labtop :elephant

:lol Yeah, pretty funny.

That is the point of this whole thing. Promote SBC's offerings.

SLOVENIAN 8
02-17-2005, 02:20 PM
I saw the video, parker is really proud of his wireless labtop :elephant
link??

bigzak25
02-17-2005, 02:20 PM
i drove by the dominion once....

sbsquared
02-17-2005, 05:05 PM
It's on spurs.com - click on the part that says SBC homecourt. I was a little disappointed in the quality of the video - the lighting could have been better. But still it's cool to see the inside of the star's houses.

I can actually see the backside of Tony's house from my house - his house is across the bluff from mine - but that's probably the closest I'll ever get!

SLOVENIAN 8
02-17-2005, 05:09 PM
Code please!!


To see inside the homes of your favorite Spurs players, you must be within 75 miles of the SBC Center. Please enter your 5-digit zip code below.

SpursWoman
02-17-2005, 05:12 PM
Code please!!

Use 78209 :)

SLOVENIAN 8
02-17-2005, 05:13 PM
Use 78209 :)
TNX!!! :elephant

I hope Rasho house will there to!!! :spin

PM5K
02-17-2005, 05:19 PM
That was like a sucky version of Cribs....

I like how he says his "wireless thing"....

I'm surprised he wasn't wearing an SBC shirt, at least he's not as bad of a whore as Manu with his Time Warner, I guess they both cheaped out instead of getting TD....

Useruser666
02-17-2005, 05:19 PM
Here is Rasho's house.....

http://www.marshmallowpeeps.com/recipes_crafts/uploads/Easter%20House%207.jpg

Shelly
02-17-2005, 05:22 PM
:lol

Malik's fancy dog house for when he's playing well.

http://www.familybusinesses.com/kidscabin/graphics/pictures/log-cabin-dog-house-2-m.jpg

SLOVENIAN 8
02-17-2005, 05:24 PM
wireless thing :lol :lol :lol

Shelly
02-17-2005, 05:25 PM
okay, i'm blind...where's the link on spurs.com?

SLOVENIAN 8
02-17-2005, 05:27 PM
okay, i'm blind...where's the link on spurs.com?

http://216.173.232.173/hc/?team=1

Shelly
02-17-2005, 05:38 PM
thank you! And yet another site that hates firefox :cuss

boutons
02-17-2005, 05:41 PM
And if you think spyware and spam is bad, thanks to MS crappy products, then get ready for real nightmares:

==================================

Microsoft Warns of New Security Threat

System monitoring programs, called rootkits, may pose a serious danger to
your PC.

Paul Roberts, IDG News Service
Thursday, February 17, 2005

Microsoft security researchers are warning about a new generation of
powerful system monitoring programs, or "rootkits," that are almost
impossible to detect using current security products and that could pose a
serious risk to corporations and individuals.
Advertisement

The researchers discussed the growing threat posed by kernel root kits at a
session at the RSA Security Conference in San Francisco this week. The
malicious snooping programs are becoming more common and could soon be used
to create a new generation of mass-distributed
<http://www.pcworld.com/resource/browse/0,cat,1713,sortIdx,1,00.asp>spyware
and worms.

With names like "Hacker Defender," "FU," and "Vanquish," the programs are
the latest generation of remote system monitoring software that has been
around for years, according to Mike Danseglio and Kurt Dillard, both of
Microsoft's Security Solutions Group.

The programs are used by malicious hackers to control, attack, or ferret
information from systems on which the software has been installed and are
typically installed on a machine without the owner's knowledge, either by a
virus or following a successful hack of the computer's defenses, they say.

Running in the Background

Once installed, many rootkits simply run quietly in the background but can
easily be spotted by looking for memory processes that are running on the
infected system, monitoring outbound communications from the machine, or
checking for newly installed programs.

However, kernel rootkits, which modify the kernel, or core request
processing, component of an operating system, are becoming more common.
Rootkit authors are also making huge strides in their ability to hide their
creations, says Danseglio.

In particular, some newer rootkits are able to intercept queries or "system
calls" that are passed to the kernel and filter out queries generated by
the rootkit software. The result is that typical signs that a program is
running, such as an executable file name, a named process that uses some of
the computer's memory, or configuration settings in the operating system's
registry, are invisible to administrators and to detection tools, says
Danseglio.

The increasingly sophisticated rootkits and the speed with which techniques
are migrating from rootkits to spyware and viruses may be the result of
influence from organized online criminal groups that value stealthy,
invasive software, says Dillard.

One rootkit, called Hacker Defender, which was released about one year ago,
even uses encryption to protect outbound communications and can piggyback
on commonly used ports such as TCP (Transmission Control Protocol) port 135
to communicate with the outside world without interrupting other
applications that communicate on that port, he says.

Detection Options

The kernel rootkits are invisible to many detection tools, including
antivirus, host, and network intrusion detection sensors (IDS) and
anti-spyware products, the researchers say.

In fact, some of the most powerful tools for detecting the rootkits are
designed by rootkit authors, not security companies, they say.

There are few strategies for detecting kernel rootkits from an infected
system, especially because each rootkit behaves differently and uses
different strategies to hide itself.

It is sometimes possible to spot kernel rootkits by examining infected
systems from another machine on a network, says Dillard. Another strategy
to spot kernel rootkits is to use Windows PE, a stripped-down version of
the Windows XP operating system that can be run from a CD-ROM, to boot a
computer, then comparing the profile of the clean operating system to the
infected system, according to Dillard and Danseglio.

Microsoft researchers have even developed a tool, named "Strider
Ghostbuster" that can detect rootkits by comparing clean and suspect
versions of Windows and looking for differences that may indicate a kernel
rootkit is running, according to a paper
<http://research.microsoft.com/research/pubs/view.aspx?type=Technical%20Report&id=775>published
by Microsoft Research.

Still, the only reliable way to remove kernel rootkits is to completely
erase an infected hard drive and reinstall the operating system from
scratch, Danseglio says.

Although rootkits are not unique to Windows, the popular operating system
is a rich target and makes it easy for malicious hackers to disguise the
presence of such programs, according to Jonathan Levin, of Symantec's
@stake division who attended the presentation at RSA.

The operating system's powerful APIs (application programming interfaces)
make it easy to mask behaviors on the system. The company's popular
<http://www.pcworld.com/news/article/0,aid,117550,00.asp>Internet Explorer
Web browser is also a frequent avenue for malicious hackers, viruses, and
worms that could drop a rootkit on a vulnerable Windows system, Levin says.

Better tools could be built to detect the current crop of kernel rootkits.
However, rootkit authors are adept at spotting new detection techniques and
modifying their programs to slip around them, Danseglio says.

"These people are smart. They're very smart," he says.

=======================================

And MS is dumb, very dumb.

Web sites that force visitors to run MS Internet Exploder are dumber still.

IX_Equilibrium
02-17-2005, 06:00 PM
I can actually see the backside of Tony's house from my house - his house is across the bluff from mine - but that's probably the closest I'll ever get!


Damn thats nice. What part of town? The Dominion?

texbumTHElife
02-17-2005, 06:14 PM
Too bad he cant really dunk like that on a regulation rim...... for shame....

PM5K
02-17-2005, 06:20 PM
I live right next to Tony Parker and he doesn't have his wifi secured to I just use his, and I read his emails from Eva Longoria....


:lol :lol :lol

Spurs_rock05
02-17-2005, 07:18 PM
I live right next to Tony Parker and he doesn't have his wifi secured to I just use his, and I read his emails from Eva Longoria....

SURE YOU DO

TheWriter
02-17-2005, 11:19 PM
Boy, he watches a lot of porn.

Jimcs50
02-17-2005, 11:22 PM
TP has a cute pussy.

JsnSA
02-17-2005, 11:46 PM
Guess they will never have one with Manu since he uses Time Warner for his wireless thingie. :lol